최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Sustainability, v.13 no.16, 2021년, pp.8982 -
Cho, Seonghwan (Cyber Security Laboratory, Department of Computer Engineering, Chungnam National University, Daejeon 34134, Korea) , Yeom, Cheolmin (National Forestry Cooperative Federation, 166, Seokchonhosu-ro, Songpa-gu, Seoul 05601, Korea) , Won, Yoojae (Cyber Security Laboratory, Department of Computer Engineering, Chungnam National University, Daejeon 34134, Korea)
There is a critical vulnerability in the 5G AKA protocol of the 3GPP. We propose a protocol that compensates for these vulnerabilities and speed up the existing protocol; and the study implements this protocol to experiment with the vulnerabilities. The protocol uses the Light-weight Encryption Algo...
GSMA (2021, May 21). The Mobile Economy. Available online: https://www.gsma.com/mobileeconomy/wp-content/uploads/2020/03/GSMA_MobileEconomy2020_Global.pdf.
ITU (2015). IMT Vision-Framework and Overall Objectives of the Future Development of IMT for 2020 and Beyond, Recommendation ITU. Available online: https://www.itu.int/rec/R-REC-M.2083.
Nieto Crowdsourcing Analysis in 5G IoT Cybersecurity Threats and Mitigation Mob. Net. Appl. 2019 10.1007/s11036-018-1146-4 24 881
(2021, May 21). 3GPP-Technical Report; Study on the Security Aspects of the Next Generation System. (Release 14). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3045.
Ylianttila, M., Kantola, R., Gurtov, A., Mucchi, L., Oppermann, I., Yan, Z., Nguyen, T.H., Liu, F., Hewa, T., and Liyanage, M. (2020). 6G white paper: Research challenges for trust, security and privacy. arXiv.
10.1186/s13673-020-00258-2 Akhtar, M.W., Hassan, S.A., Ghaffar, R., Jung, H., and Hossain, M.S. (2020). The Shift to 6G Communications: Vision and Requirements. Hum. Cent. Comput. Inf. Sci., 10.
10.1186/s13673-020-00254-6 Rad, M.M., Rahmani, A.M., Sahafi, A., and Qader, N.N. (2020). Social Internet of Things: Vision, challenges, and trends. Hum. Cent. Comput. Inf. Sci., 10.
Pan, F., Wen, H., Song, H., Jie, T., and Wang, L. (2015, January 2-4). 5G security architecture and light weight security authentication. Proceedings of the 2015 IEEE/CIC International Conference on Communications in China-Workshops (CIC/ICCC), Shenzhen, China.
Dehnel-Wild, M., and Cremers, C. (2018). Security Vulnerability in 5G-AKA Draft, Department of Computer Science, University of Oxford.
Borgaonkar New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols Proc. Privacy Enhancing Technol. 2019 10.2478/popets-2019-0039 2019 108
Jung The Security Vulnerabilities of 5G-AKA and PUF-Based Security Improvement Converg. Sec. J. 2019 19 3
Braeken Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks IEEE Digit. Object Identifier 2019 7 64040
Kim, Y., Lee, H., and Perrig, A. (2013). LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. Information Security Applications. WISA 2013, Springer. Lecture Notes in Computer Science.
Heron Advanced Encryption Standard (AES) Netw. Secur. 2009 10.1016/S1353-4858(10)70006-4 2009 8
(2021, May 21). 3GPP-Technical Specification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5*. In Document 2: Algorithm Specification. (Release 16). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2391.
(2021, May 21). 3GPP-Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system; (Release 16). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169.
(2021, May 21). 3GPP-Technical Specification Group Services and System Aspects; 3G Security; Security Architecture; (Release 16). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2262.
Concone SMCP: A Secure Mobile Crowdsensing Protocol for Fog-Based Applications Hum. Cent. Comput. Inf. Sci. 2020 10.1186/s13673-020-00232-y 10 28
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.